Overview
overview
10Static
static
3KMSpico/KM...xt.dll
windows10-2004-x64
1KMSpico/KM...32.dll
windows10-2004-x64
1KMSpico/KM...lc.dll
windows10-2004-x64
3KMSpico/KM...re.dll
windows10-2004-x64
3KMSpico/KM...ll.dll
windows10-2004-x64
3KMSpico/KM...RT.dll
windows10-2004-x64
3KMSpico/KM...es.dll
windows10-2004-x64
3KMSpico/KM...ls.dll
windows10-2004-x64
3KMSpico/KM...ar.exe
windows10-2004-x64
1KMSpico/KM...32.dll
windows10-2004-x64
3KMSpico/KM...32.dll
windows10-2004-x64
3KMSpico/KM...re.pkg
macos-10.15-amd64
KMSpico/KM...ar.dll
windows10-2004-x64
3KMSpico/KM...te.exe
windows10-2004-x64
10KMSpico/KM...32.dll
windows10-2004-x64
3KMSpico/KM...64.dll
windows10-2004-x64
1KMSpico/KM...32.dll
windows10-2004-x64
3KMSpico/KM...64.dll
windows10-2004-x64
1KMSpico/KM...io.exe
windows10-2004-x64
1KMSpico/KM...iz.exe
windows10-2004-x64
3KMSpico/KM...er.exe
windows10-2004-x64
3KMSpico/KM...ll.dll
windows10-2004-x64
3KMSpico/KM...RT.dll
windows10-2004-x64
3KMSpico/KM...es.dll
windows10-2004-x64
3KMSpico/KM...ls.dll
windows10-2004-x64
3KMSpico/KM...ar.exe
windows10-2004-x64
1KMSpico/KM...32.dll
windows10-2004-x64
3KMSpico/KM...32.dll
windows10-2004-x64
3KMSpico/KM...re.pkg
macos-10.15-amd64
KMSpico/KM...ar.dll
windows10-2004-x64
3KMSpico/KM...49.dll
windows10-2004-x64
1KMSpico/KM...58.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
KMSpico/KMSpico/Resource/Full-Info/cluswmiext.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
KMSpico/KMSpico/Resource/Full-Info/cmdial32.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
KMSpico/KMSpico/Resource/Full-Info/libvlc.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
KMSpico/KMSpico/Resource/Full-Info/libvlccore.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral5
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/ICQLiteShell.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/ICQRT.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral7
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/Language/LiteRes.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral8
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/Language/LiteSkinUtils.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral9
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/Language/WinRar.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral10
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/Language/madHcNet32.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral11
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/Language/mvrSettings32.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/Language/nolimetangere.pkg
Resource
macos-20250410-en
Behavioral task
behavioral13
Sample
KMSpico/KMSpico/Resource/Full-Info/plugins/cache/Language/unrar.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral14
Sample
KMSpico/KMSpico/activate.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral15
Sample
KMSpico/KMSpico/plugins/CryptoPP530Fips32.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral16
Sample
KMSpico/KMSpico/plugins/CryptoPP530Fips64.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral17
Sample
KMSpico/KMSpico/plugins/FlowSshC32.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral18
Sample
KMSpico/KMSpico/plugins/FlowSshC64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
KMSpico/KMSpico/plugins/Microsoft.VisualStudio.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral20
Sample
KMSpico/KMSpico/plugins/NvStWiz.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral21
Sample
KMSpico/KMSpico/plugins/StartupHelper.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral22
Sample
KMSpico/KMSpico/plugins/cache/ICQLiteShell.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral23
Sample
KMSpico/KMSpico/plugins/cache/ICQRT.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral24
Sample
KMSpico/KMSpico/plugins/cache/Language/LiteRes.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral25
Sample
KMSpico/KMSpico/plugins/cache/Language/LiteSkinUtils.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral26
Sample
KMSpico/KMSpico/plugins/cache/Language/WinRar.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
KMSpico/KMSpico/plugins/cache/Language/madHcNet32.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral28
Sample
KMSpico/KMSpico/plugins/cache/Language/mvrSettings32.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
KMSpico/KMSpico/plugins/cache/Language/nolimetangere.pkg
Resource
macos-20241101-en
Behavioral task
behavioral30
Sample
KMSpico/KMSpico/plugins/cache/Language/unrar.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral31
Sample
KMSpico/KMSpico/plugins/lang-1049.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral32
Sample
KMSpico/KMSpico/plugins/lang-1058.dll
Resource
win10v2004-20250410-en
General
-
Target
KMSpico/KMSpico/activate.exe
-
Size
662.3MB
-
MD5
2bd0cf677057e90ac12aeafdd256eab9
-
SHA1
32a743c040c08d4620afb39bb40ed5fdbf1cbb79
-
SHA256
3212d66b56683e0d962b803632f8f8a16d8d7a0211e0d02d8dfa1dfc11aa6a6e
-
SHA512
625c4ef5e067cc5d2c317c885875722e95a9f43cd5ef8bf025214c544c0a7fc7996540a8fe90788ae515b8b386e4757a130b538c2a9c4fa1d250181c983454b8
-
SSDEEP
393216:1jL2iDc7/6febH1MO9ftIcJfVjR+dP4duDoddkjU6p6qH+8B:1jLBebbptISy2k3jp
Malware Config
Extracted
lumma
https://revitmodh.run/pzaw
https://dsoursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://rliftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://ixcelmodo.run/nahd
Signatures
-
Lumma family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 3168 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 10 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language activate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 116 activate.exe 116 activate.exe 116 activate.exe 116 activate.exe 116 activate.exe 116 activate.exe 116 activate.exe 116 activate.exe 116 activate.exe 116 activate.exe 3168 powershell.exe 3168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeImpersonatePrivilege 116 activate.exe Token: SeImpersonatePrivilege 116 activate.exe Token: SeDebugPrivilege 3168 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 3168 116 activate.exe 85 PID 116 wrote to memory of 3168 116 activate.exe 85 PID 116 wrote to memory of 3168 116 activate.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\KMSpico\KMSpico\activate.exe"C:\Users\Admin\AppData\Local\Temp\KMSpico\KMSpico\activate.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass <!DOCTYPE html> <html lang="en"> <head> <meta name="viewport" content="width=device-width, initial-scale=0.75, maximum-scale=1.0, user-scalable=yes" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Pastebin.com - Not Found (#404)</title> </head> <body> <h1>Not Found (#404)</h1> <p>This page is no longer available. It has either expired, been removed by its creator, or removed by one of the Pastebin staff.</p> </body> </html>2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82